| T1001 | Data Obfuscation |
| T1001.001 | Junk Data |
| T1001.002 | Steganography |
| T1001.003 | Protocol or Service Impersonation |
| T1002 | Data Compressed |
| T1003 | OS Credential Dumping |
| T1003.001 | LSASS Memory |
| T1003.002 | Security Account Manager |
| T1003.003 | NTDS |
| T1003.004 | LSA Secrets |
| T1003.005 | Cached Domain Credentials |
| T1003.006 | DCSync |
| T1003.007 | Proc Filesystem |
| T1003.008 | /etc/passwd and /etc/shadow |
| T1004 | Winlogon Helper DLL |
| T1005 | Data from Local System |
| T1006 | Direct Volume Access |
| T1007 | System Service Discovery |
| T1008 | Fallback Channels |
| T1009 | Binary Padding |
| T1010 | Application Window Discovery |
| T1011 | Exfiltration Over Other Network Medium |
| T1011.001 | Exfiltration Over Bluetooth |
| T1012 | Query Registry |
| T1013 | Port Monitors |
| T1014 | Rootkit |
| T1015 | Accessibility Features |
| T1016 | System Network Configuration Discovery |
| T1016.001 | Internet Connection Discovery |
| T1016.002 | Wi-Fi Discovery |
| T1017 | Application Deployment Software |
| T1018 | Remote System Discovery |
| T1019 | System Firmware |
| T1020 | Automated Exfiltration |
| T1020.001 | Traffic Duplication |
| T1021 | Remote Services |
| T1021.001 | Remote Desktop Protocol |
| T1021.002 | SMB/Windows Admin Shares |
| T1021.003 | Distributed Component Object Model |
| T1021.004 | SSH |
| T1021.005 | VNC |
| T1021.006 | Windows Remote Management |
| T1021.007 | Cloud Services |
| T1021.008 | Direct Cloud VM Connections |
| T1022 | Data Encrypted |
| T1023 | Shortcut Modification |
| T1024 | Custom Cryptographic Protocol |
| T1025 | Data from Removable Media |
| T1026 | Multiband Communication |
| T1027 | Obfuscated Files or Information |
| T1027.001 | Binary Padding |
| T1027.002 | Software Packing |
| T1027.003 | Steganography |
| T1027.004 | Compile After Delivery |
| T1027.005 | Indicator Removal from Tools |
| T1027.006 | HTML Smuggling |
| T1027.007 | Dynamic API Resolution |
| T1027.008 | Stripped Payloads |
| T1027.009 | Embedded Payloads |
| T1027.010 | Command Obfuscation |
| T1027.011 | Fileless Storage |
| T1027.012 | LNK Icon Smuggling |
| T1027.013 | Encrypted/Encoded File |
| T1027.014 | Polymorphic Code |
| T1027.015 | Compression |
| T1027.016 | Junk Code Insertion |
| T1027.017 | SVG Smuggling |
| T1028 | Windows Remote Management |
| T1029 | Scheduled Transfer |
| T1030 | Data Transfer Size Limits |
| T1031 | Modify Existing Service |
| T1032 | Standard Cryptographic Protocol |
| T1033 | System Owner/User Discovery |
| T1034 | Path Interception |
| T1035 | Service Execution |
| T1036 | Masquerading |
| T1036.001 | Invalid Code Signature |
| T1036.002 | Right-to-Left Override |
| T1036.003 | Rename Legitimate Utilities |
| T1036.004 | Masquerade Task or Service |
| T1036.005 | Match Legitimate Resource Name or Location |
| T1036.006 | Space after Filename |
| T1036.007 | Double File Extension |
| T1036.008 | Masquerade File Type |
| T1036.009 | Break Process Trees |
| T1036.010 | Masquerade Account Name |
| T1036.011 | Overwrite Process Arguments |
| T1037 | Boot or Logon Initialization Scripts |
| T1037.001 | Logon Script (Windows) |
| T1037.002 | Login Hook |
| T1037.003 | Network Logon Script |
| T1037.004 | RC Scripts |
| T1037.005 | Startup Items |
| T1038 | DLL Search Order Hijacking |
| T1039 | Data from Network Shared Drive |
| T1040 | Network Sniffing |
| T1041 | Exfiltration Over C2 Channel |
| T1042 | Change Default File Association |
| T1043 | Commonly Used Port |
| T1044 | File System Permissions Weakness |
| T1045 | Software Packing |
| T1046 | Network Service Discovery |
| T1047 | Windows Management Instrumentation |
| T1048 | Exfiltration Over Alternative Protocol |
| T1048.001 | Exfiltration Over Symmetric Encrypted Non-C2 Protocol |
| T1048.002 | Exfiltration Over Asymmetric Encrypted Non-C2 Protocol |
| T1048.003 | Exfiltration Over Unencrypted Non-C2 Protocol |
| T1049 | System Network Connections Discovery |
| T1050 | New Service |
| T1051 | Shared Webroot |
| T1052 | Exfiltration Over Physical Medium |
| T1052.001 | Exfiltration over USB |
| T1053 | Scheduled Task/Job |
| T1053.001 | At (Linux) Execution |
| T1053.002 | At |
| T1053.003 | Cron |
| T1053.004 | Launchd |
| T1053.005 | Scheduled Task |
| T1053.006 | Systemd Timers |
| T1053.007 | Container Orchestration Job |
| T1054 | Indicator Blocking |
| T1055 | Process Injection |
| T1055.001 | Dynamic-link Library Injection |
| T1055.002 | Portable Executable Injection |
| T1055.003 | Thread Execution Hijacking |
| T1055.004 | Asynchronous Procedure Call |
| T1055.005 | Thread Local Storage |
| T1055.008 | Ptrace System Calls |
| T1055.009 | Proc Memory |
| T1055.011 | Extra Window Memory Injection |
| T1055.012 | Process Hollowing |
| T1055.013 | Process Doppelgänging |
| T1055.014 | VDSO Hijacking |
| T1055.015 | ListPlanting |
| T1056 | Input Capture |
| T1056.001 | Keylogging |
| T1056.002 | GUI Input Capture |
| T1056.003 | Web Portal Capture |
| T1056.004 | Credential API Hooking |
| T1057 | Process Discovery |
| T1058 | Service Registry Permissions Weakness |
| T1059 | Command and Scripting Interpreter |
| T1059.001 | PowerShell |
| T1059.002 | AppleScript |
| T1059.003 | Windows Command Shell |
| T1059.004 | Unix Shell |
| T1059.005 | Visual Basic |
| T1059.006 | Python |
| T1059.007 | JavaScript |
| T1059.008 | Network Device CLI |
| T1059.009 | Cloud API |
| T1059.010 | AutoHotKey & AutoIT |
| T1059.011 | Lua |
| T1059.012 | Hypervisor CLI |
| T1060 | Registry Run Keys / Startup Folder |
| T1061 | Graphical User Interface |
| T1062 | Hypervisor |
| T1063 | Security Software Discovery |
| T1064 | Scripting |
| T1065 | Uncommonly Used Port |
| T1066 | Indicator Removal from Tools |
| T1067 | Bootkit |
| T1068 | Exploitation for Privilege Escalation |
| T1069 | Permission Groups Discovery |
| T1069.001 | Local Groups |
| T1069.002 | Domain Groups |
| T1069.003 | Cloud Groups |
| T1070 | Indicator Removal |
| T1070.001 | Clear Windows Event Logs |
| T1070.002 | Clear Linux or Mac System Logs |
| T1070.003 | Clear Command History |
| T1070.004 | File Deletion |
| T1070.005 | Network Share Connection Removal |
| T1070.006 | Timestomp |
| T1070.007 | Clear Network Connection History and Configurations |
| T1070.008 | Clear Mailbox Data |
| T1070.009 | Clear Persistence |
| T1070.010 | Relocate Malware |
| T1071 | Application Layer Protocol |
| T1071.001 | Web Protocols |
| T1071.002 | File Transfer Protocols |
| T1071.003 | Mail Protocols |
| T1071.004 | DNS |
| T1071.005 | Publish/Subscribe Protocols |
| T1072 | Software Deployment Tools |
| T1073 | DLL Side-Loading |
| T1074 | Data Staged |
| T1074.001 | Local Data Staging |
| T1074.002 | Remote Data Staging |
| T1075 | Pass the Hash |
| T1076 | Remote Desktop Protocol |
| T1077 | Windows Admin Shares |
| T1078 | Valid Accounts |
| T1078.001 | Default Accounts |
| T1078.002 | Domain Accounts |
| T1078.003 | Local Accounts |
| T1078.004 | Cloud Accounts |
| T1079 | Multilayer Encryption |
| T1080 | Taint Shared Content |
| T1081 | Credentials in Files |
| T1082 | System Information Discovery |
| T1083 | File and Directory Discovery |
| T1084 | Windows Management Instrumentation Event Subscription |
| T1085 | Rundll32 |
| T1086 | PowerShell |
| T1087 | Account Discovery |
| T1087.001 | Local Account |
| T1087.002 | Domain Account |
| T1087.003 | Email Account |
| T1087.004 | Cloud Account |
| T1088 | Bypass User Account Control |
| T1089 | Disabling Security Tools |
| T1090 | Proxy |
| T1090.001 | Internal Proxy |
| T1090.002 | External Proxy |
| T1090.003 | Multi-hop Proxy |
| T1090.004 | Domain Fronting |
| T1091 | Replication Through Removable Media |
| T1092 | Communication Through Removable Media |
| T1093 | Process Hollowing |
| T1094 | Custom Command and Control Protocol |
| T1095 | Non-Application Layer Protocol |
| T1096 | NTFS File Attributes |
| T1097 | Pass the Ticket |
| T1098 | Account Manipulation |
| T1098.001 | Additional Cloud Credentials |
| T1098.002 | Additional Email Delegate Permissions |
| T1098.003 | Additional Cloud Roles |
| T1098.004 | SSH Authorized Keys |
| T1098.005 | Device Registration |
| T1098.006 | Additional Container Cluster Roles |
| T1098.007 | Additional Local or Domain Groups |
| T1099 | Timestomp |
| T1100 | Web Shell |
| T1101 | Security Support Provider |
| T1102 | Web Service |
| T1102.001 | Dead Drop Resolver |
| T1102.002 | Bidirectional Communication |
| T1102.003 | One-Way Communication |
| T1103 | AppInit DLLs |
| T1104 | Multi-Stage Channels |
| T1105 | Ingress Tool Transfer |
| T1106 | Native API |
| T1107 | File Deletion |
| T1108 | Redundant Access |
| T1109 | Component Firmware |
| T1110 | Brute Force |
| T1110.001 | Password Guessing |
| T1110.002 | Password Cracking |
| T1110.003 | Password Spraying |
| T1110.004 | Credential Stuffing |
| T1111 | Multi-Factor Authentication Interception |
| T1112 | Modify Registry |
| T1113 | Screen Capture |
| T1114 | Email Collection |
| T1114.001 | Local Email Collection |
| T1114.002 | Remote Email Collection |
| T1114.003 | Email Forwarding Rule |
| T1115 | Clipboard Data |
| T1116 | Code Signing |
| T1117 | Regsvr32 |
| T1118 | InstallUtil |
| T1119 | Automated Collection |
| T1120 | Peripheral Device Discovery |
| T1121 | Regsvcs/Regasm |
| T1122 | Component Object Model Hijacking |
| T1123 | Audio Capture |
| T1124 | System Time Discovery |
| T1125 | Video Capture |
| T1126 | Network Share Connection Removal |
| T1127 | Trusted Developer Utilities Proxy Execution |
| T1127.001 | MSBuild |
| T1127.002 | ClickOnce |
| T1127.003 | JamPlus |
| T1128 | Netsh Helper DLL |
| T1129 | Shared Modules |
| T1130 | Install Root Certificate |
| T1131 | Authentication Package |
| T1132 | Data Encoding |
| T1132.001 | Standard Encoding |
| T1132.002 | Non-Standard Encoding |
| T1133 | External Remote Services |
| T1134 | Access Token Manipulation |
| T1134.001 | Token Impersonation/Theft |
| T1134.002 | Create Process with Token |
| T1134.003 | Make and Impersonate Token |
| T1134.004 | Parent PID Spoofing |
| T1134.005 | SID-History Injection |
| T1135 | Network Share Discovery |
| T1136 | Create Account |
| T1136.001 | Local Account |
| T1136.002 | Domain Account |
| T1136.003 | Cloud Account |
| T1137 | Office Application Startup |
| T1137.001 | Office Template Macros |
| T1137.002 | Office Test |
| T1137.003 | Outlook Forms |
| T1137.004 | Outlook Home Page |
| T1137.005 | Outlook Rules |
| T1137.006 | Add-ins |
| T1138 | Application Shimming |
| T1139 | Bash History |
| T1140 | Deobfuscate/Decode Files or Information |
| T1141 | Input Prompt |
| T1142 | Keychain |
| T1143 | Hidden Window |
| T1144 | Gatekeeper Bypass |
| T1145 | Private Keys |
| T1146 | Clear Command History |
| T1147 | Hidden Users |
| T1148 | HISTCONTROL |
| T1149 | LC_MAIN Hijacking |
| T1150 | Plist Modification |
| T1151 | Space after Filename |
| T1152 | Launchctl |
| T1153 | Source |
| T1154 | Trap |
| T1155 | AppleScript |
| T1156 | Malicious Shell Modification |
| T1157 | Dylib Hijacking |
| T1158 | Hidden Files and Directories |
| T1159 | Launch Agent |
| T1160 | Launch Daemon |
| T1161 | LC_LOAD_DYLIB Addition |
| T1162 | Login Item |
| T1163 | Rc.common |
| T1164 | Re-opened Applications |
| T1165 | Startup Items |
| T1166 | Setuid and Setgid |
| T1167 | Securityd Memory |
| T1168 | Local Job Scheduling |
| T1169 | Sudo |
| T1170 | Mshta |
| T1171 | LLMNR/NBT-NS Poisoning and Relay |
| T1172 | Domain Fronting |
| T1173 | Dynamic Data Exchange |
| T1174 | Password Filter DLL |
| T1175 | Component Object Model and Distributed COM |
| T1176 | Software Extensions |
| T1176.001 | Browser Extensions |
| T1176.002 | IDE Extensions |
| T1177 | LSASS Driver |
| T1178 | SID-History Injection |
| T1179 | Hooking |
| T1180 | Screensaver |
| T1181 | Extra Window Memory Injection |
| T1182 | AppCert DLLs |
| T1183 | Image File Execution Options Injection |
| T1184 | SSH Hijacking |
| T1185 | Browser Session Hijacking |
| T1186 | Process Doppelgänging |
| T1187 | Forced Authentication |
| T1188 | Multi-hop Proxy |
| T1189 | Drive-by Compromise |
| T1190 | Exploit Public-Facing Application |
| T1191 | CMSTP |
| T1192 | Spearphishing Link |
| T1193 | Spearphishing Attachment |
| T1194 | Spearphishing via Service |
| T1195 | Supply Chain Compromise |
| T1195.001 | Compromise Software Dependencies and Development Tools |
| T1195.002 | Compromise Software Supply Chain |
| T1195.003 | Compromise Hardware Supply Chain |
| T1196 | Control Panel Items |
| T1197 | BITS Jobs |
| T1198 | SIP and Trust Provider Hijacking |
| T1199 | Trusted Relationship |
| T1200 | Hardware Additions |
| T1201 | Password Policy Discovery |
| T1202 | Indirect Command Execution |
| T1203 | Exploitation for Client Execution |
| T1204 | User Execution |
| T1204.001 | Malicious Link |
| T1204.002 | Malicious File |
| T1204.003 | Malicious Image |
| T1204.004 | Malicious Copy and Paste |
| T1205 | Traffic Signaling |
| T1205.001 | Port Knocking |
| T1205.002 | Socket Filters |
| T1206 | Sudo Caching |
| T1207 | Rogue Domain Controller |
| T1208 | Kerberoasting |
| T1209 | Time Providers |
| T1210 | Exploitation of Remote Services |
| T1211 | Exploitation for Defense Evasion |
| T1212 | Exploitation for Credential Access |
| T1213 | Data from Information Repositories |
| T1213.001 | Confluence |
| T1213.002 | Sharepoint |
| T1213.003 | Code Repositories |
| T1213.004 | Customer Relationship Management Software |
| T1213.005 | Messaging Applications |
| T1214 | Credentials in Registry |
| T1215 | Kernel Modules and Extensions |
| T1216 | System Script Proxy Execution |
| T1216.001 | PubPrn |
| T1216.002 | SyncAppvPublishingServer |
| T1217 | Browser Information Discovery |
| T1218 | System Binary Proxy Execution |
| T1218.001 | Compiled HTML File |
| T1218.002 | Control Panel |
| T1218.003 | CMSTP |
| T1218.004 | InstallUtil |
| T1218.005 | Mshta |
| T1218.007 | Msiexec |
| T1218.008 | Odbcconf |
| T1218.009 | Regsvcs/Regasm |
| T1218.010 | Regsvr32 |
| T1218.011 | Rundll32 |
| T1218.012 | Verclsid |
| T1218.013 | Mavinject |
| T1218.014 | MMC |
| T1218.015 | Electron Applications |
| T1219 | Remote Access Tools |
| T1219.001 | IDE Tunneling |
| T1219.002 | Remote Desktop Software |
| T1219.003 | Remote Access Hardware |
| T1220 | XSL Script Processing |
| T1221 | Template Injection |
| T1222 | File and Directory Permissions Modification |
| T1222.001 | Windows File and Directory Permissions Modification |
| T1222.002 | Linux and Mac File and Directory Permissions Modification |
| T1223 | Compiled HTML File |
| T1480 | Execution Guardrails |
| T1480.001 | Environmental Keying |
| T1480.002 | Mutual Exclusion |
| T1482 | Domain Trust Discovery |
| T1483 | Domain Generation Algorithms |
| T1484 | Domain or Tenant Policy Modification |
| T1484.001 | Group Policy Modification |
| T1484.002 | Trust Modification |
| T1485 | Data Destruction |
| T1485.001 | Lifecycle-Triggered Deletion |
| T1486 | Data Encrypted for Impact |
| T1487 | Disk Structure Wipe |
| T1488 | Disk Content Wipe |
| T1489 | Service Stop |
| T1490 | Inhibit System Recovery |
| T1491 | Defacement |
| T1491.001 | Internal Defacement |
| T1491.002 | External Defacement |
| T1492 | Stored Data Manipulation |
| T1493 | Transmitted Data Manipulation |
| T1494 | Runtime Data Manipulation |
| T1495 | Firmware Corruption |
| T1496 | Resource Hijacking |
| T1496.001 | Compute Hijacking |
| T1496.002 | Bandwidth Hijacking |
| T1496.003 | SMS Pumping |
| T1496.004 | Cloud Service Hijacking |
| T1497 | Virtualization/Sandbox Evasion |
| T1497.001 | System Checks |
| T1497.002 | User Activity Based Checks |
| T1497.003 | Time Based Evasion |
| T1498 | Network Denial of Service |
| T1498.001 | Direct Network Flood |
| T1498.002 | Reflection Amplification |
| T1499 | Endpoint Denial of Service |
| T1499.001 | OS Exhaustion Flood |
| T1499.002 | Service Exhaustion Flood |
| T1499.003 | Application Exhaustion Flood |
| T1499.004 | Application or System Exploitation |
| T1500 | Compile After Delivery |
| T1501 | Systemd Service |
| T1502 | Parent PID Spoofing |
| T1503 | Credentials from Web Browsers |
| T1504 | PowerShell Profile |
| T1505 | Server Software Component |
| T1505.001 | SQL Stored Procedures |
| T1505.002 | Transport Agent |
| T1505.003 | Web Shell |
| T1505.004 | IIS Components |
| T1505.005 | Terminal Services DLL |
| T1505.006 | vSphere Installation Bundles |
| T1506 | Web Session Cookie |
| T1514 | Elevated Execution with Prompt |
| T1518 | Software Discovery |
| T1518.001 | Security Software Discovery |
| T1519 | Emond |
| T1522 | Cloud Instance Metadata API |
| T1525 | Implant Internal Image |
| T1526 | Cloud Service Discovery |
| T1527 | Application Access Token |
| T1528 | Steal Application Access Token |
| T1529 | System Shutdown/Reboot |
| T1530 | Data from Cloud Storage |
| T1531 | Account Access Removal |
| T1534 | Internal Spearphishing |
| T1535 | Unused/Unsupported Cloud Regions |
| T1536 | Revert Cloud Instance |
| T1537 | Transfer Data to Cloud Account |
| T1538 | Cloud Service Dashboard |
| T1539 | Steal Web Session Cookie |
| T1542 | Pre-OS Boot |
| T1542.001 | System Firmware |
| T1542.002 | Component Firmware |
| T1542.003 | Bootkit |
| T1542.004 | ROMMONkit |
| T1542.005 | TFTP Boot |
| T1543 | Create or Modify System Process |
| T1543.001 | Launch Agent |
| T1543.002 | Systemd Service |
| T1543.003 | Windows Service |
| T1543.004 | Launch Daemon |
| T1543.005 | Container Service |
| T1546 | Event Triggered Execution |
| T1546.001 | Change Default File Association |
| T1546.002 | Screensaver |
| T1546.003 | Windows Management Instrumentation Event Subscription |
| T1546.004 | Unix Shell Configuration Modification |
| T1546.005 | Trap |
| T1546.006 | LC_LOAD_DYLIB Addition |
| T1546.007 | Netsh Helper DLL |
| T1546.008 | Accessibility Features |
| T1546.009 | AppCert DLLs |
| T1546.010 | AppInit DLLs |
| T1546.011 | Application Shimming |
| T1546.012 | Image File Execution Options Injection |
| T1546.013 | PowerShell Profile |
| T1546.014 | Emond |
| T1546.015 | Component Object Model Hijacking |
| T1546.016 | Installer Packages |
| T1546.017 | Udev Rules |
| T1547 | Boot or Logon Autostart Execution |
| T1547.001 | Registry Run Keys / Startup Folder |
| T1547.002 | Authentication Package |
| T1547.003 | Time Providers |
| T1547.004 | Winlogon Helper DLL |
| T1547.005 | Security Support Provider |
| T1547.006 | Kernel Modules and Extensions |
| T1547.007 | Re-opened Applications |
| T1547.008 | LSASS Driver |
| T1547.009 | Shortcut Modification |
| T1547.010 | Port Monitors |
| T1547.011 | Plist Modification |
| T1547.012 | Print Processors |
| T1547.013 | XDG Autostart Entries |
| T1547.014 | Active Setup |
| T1547.015 | Login Items |
| T1548 | Abuse Elevation Control Mechanism |
| T1548.001 | Setuid and Setgid |
| T1548.002 | Bypass User Account Control |
| T1548.003 | Sudo and Sudo Caching |
| T1548.004 | Elevated Execution with Prompt |
| T1548.005 | Temporary Elevated Cloud Access |
| T1548.006 | TCC Manipulation |
| T1550 | Use Alternate Authentication Material |
| T1550.001 | Application Access Token |
| T1550.002 | Pass the Hash |
| T1550.003 | Pass the Ticket |
| T1550.004 | Web Session Cookie |
| T1552 | Unsecured Credentials |
| T1552.001 | Credentials In Files |
| T1552.002 | Credentials in Registry |
| T1552.003 | Bash History |
| T1552.004 | Private Keys |
| T1552.005 | Cloud Instance Metadata API |
| T1552.006 | Group Policy Preferences |
| T1552.007 | Container API |
| T1552.008 | Chat Messages |
| T1553 | Subvert Trust Controls |
| T1553.001 | Gatekeeper Bypass |
| T1553.002 | Code Signing |
| T1553.003 | SIP and Trust Provider Hijacking |
| T1553.004 | Install Root Certificate |
| T1553.005 | Mark-of-the-Web Bypass |
| T1553.006 | Code Signing Policy Modification |
| T1554 | Compromise Host Software Binary |
| T1555 | Credentials from Password Stores |
| T1555.001 | Keychain |
| T1555.002 | Securityd Memory |
| T1555.003 | Credentials from Web Browsers |
| T1555.004 | Windows Credential Manager |
| T1555.005 | Password Managers |
| T1555.006 | Cloud Secrets Management Stores |
| T1556 | Modify Authentication Process |
| T1556.001 | Domain Controller Authentication |
| T1556.002 | Password Filter DLL |
| T1556.003 | Pluggable Authentication Modules |
| T1556.004 | Network Device Authentication |
| T1556.005 | Reversible Encryption |
| T1556.006 | Multi-Factor Authentication |
| T1556.007 | Hybrid Identity |
| T1556.008 | Network Provider DLL |
| T1556.009 | Conditional Access Policies |
| T1557 | Adversary-in-the-Middle |
| T1557.001 | LLMNR/NBT-NS Poisoning and SMB Relay |
| T1557.002 | ARP Cache Poisoning |
| T1557.003 | DHCP Spoofing |
| T1557.004 | Evil Twin |
| T1558 | Steal or Forge Kerberos Tickets |
| T1558.001 | Golden Ticket |
| T1558.002 | Silver Ticket |
| T1558.003 | Kerberoasting |
| T1558.004 | AS-REP Roasting |
| T1558.005 | Ccache Files |
| T1559 | Inter-Process Communication |
| T1559.001 | Component Object Model |
| T1559.002 | Dynamic Data Exchange |
| T1559.003 | XPC Services |
| T1560 | Archive Collected Data |
| T1560.001 | Archive via Utility |
| T1560.002 | Archive via Library |
| T1560.003 | Archive via Custom Method |
| T1561 | Disk Wipe |
| T1561.001 | Disk Content Wipe |
| T1561.002 | Disk Structure Wipe |
| T1562 | Impair Defenses |
| T1562.001 | Disable or Modify Tools |
| T1562.002 | Disable Windows Event Logging |
| T1562.003 | Impair Command History Logging |
| T1562.004 | Disable or Modify System Firewall |
| T1562.006 | Indicator Blocking |
| T1562.007 | Disable or Modify Cloud Firewall |
| T1562.008 | Disable or Modify Cloud Logs |
| T1562.009 | Safe Mode Boot |
| T1562.010 | Downgrade Attack |
| T1562.011 | Spoof Security Alerting |
| T1562.012 | Disable or Modify Linux Audit System |
| T1563 | Remote Service Session Hijacking |
| T1563.001 | SSH Hijacking |
| T1563.002 | RDP Hijacking |
| T1564 | Hide Artifacts |
| T1564.001 | Hidden Files and Directories |
| T1564.002 | Hidden Users |
| T1564.003 | Hidden Window |
| T1564.004 | NTFS File Attributes |
| T1564.005 | Hidden File System |
| T1564.006 | Run Virtual Instance |
| T1564.007 | VBA Stomping |
| T1564.008 | Email Hiding Rules |
| T1564.009 | Resource Forking |
| T1564.010 | Process Argument Spoofing |
| T1564.011 | Ignore Process Interrupts |
| T1564.012 | File/Path Exclusions |
| T1564.013 | Bind Mounts |
| T1564.014 | Extended Attributes |
| T1565 | Data Manipulation |
| T1565.001 | Stored Data Manipulation |
| T1565.002 | Transmitted Data Manipulation |
| T1565.003 | Runtime Data Manipulation |
| T1566 | Phishing |
| T1566.001 | Spearphishing Attachment |
| T1566.002 | Spearphishing Link |
| T1566.003 | Spearphishing via Service |
| T1566.004 | Spearphishing Voice |
| T1567 | Exfiltration Over Web Service |
| T1567.001 | Exfiltration to Code Repository |
| T1567.002 | Exfiltration to Cloud Storage |
| T1567.003 | Exfiltration to Text Storage Sites |
| T1567.004 | Exfiltration Over Webhook |
| T1568 | Dynamic Resolution |
| T1568.001 | Fast Flux DNS |
| T1568.002 | Domain Generation Algorithms |
| T1568.003 | DNS Calculation |
| T1569 | System Services |
| T1569.001 | Launchctl |
| T1569.002 | Service Execution |
| T1569.003 | Systemctl |
| T1570 | Lateral Tool Transfer |
| T1571 | Non-Standard Port |
| T1572 | Protocol Tunneling |
| T1573 | Encrypted Channel |
| T1573.001 | Symmetric Cryptography |
| T1573.002 | Asymmetric Cryptography |
| T1574 | Hijack Execution Flow |
| T1574.001 | DLL |
| T1574.002 | DLL Side-Loading |
| T1574.004 | Dylib Hijacking |
| T1574.005 | Executable Installer File Permissions Weakness |
| T1574.006 | Dynamic Linker Hijacking |
| T1574.007 | Path Interception by PATH Environment Variable |
| T1574.008 | Path Interception by Search Order Hijacking |
| T1574.009 | Path Interception by Unquoted Path |
| T1574.010 | Services File Permissions Weakness |
| T1574.011 | Services Registry Permissions Weakness |
| T1574.012 | COR_PROFILER |
| T1574.013 | KernelCallbackTable |
| T1574.014 | AppDomainManager |
| T1578 | Modify Cloud Compute Infrastructure |
| T1578.001 | Create Snapshot |
| T1578.002 | Create Cloud Instance |
| T1578.003 | Delete Cloud Instance |
| T1578.004 | Revert Cloud Instance |
| T1578.005 | Modify Cloud Compute Configurations |
| T1580 | Cloud Infrastructure Discovery |
| T1583 | Acquire Infrastructure |
| T1583.001 | Domains |
| T1583.002 | DNS Server |
| T1583.003 | Virtual Private Server |
| T1583.004 | Server |
| T1583.005 | Botnet |
| T1583.006 | Web Services |
| T1583.007 | Serverless |
| T1583.008 | Malvertising |
| T1584 | Compromise Infrastructure |
| T1584.001 | Domains |
| T1584.002 | DNS Server |
| T1584.003 | Virtual Private Server |
| T1584.004 | Server |
| T1584.005 | Botnet |
| T1584.006 | Web Services |
| T1584.007 | Serverless |
| T1584.008 | Network Devices |
| T1585 | Establish Accounts |
| T1585.001 | Social Media Accounts |
| T1585.002 | Email Accounts |
| T1585.003 | Cloud Accounts |
| T1586 | Compromise Accounts |
| T1586.001 | Social Media Accounts |
| T1586.002 | Email Accounts |
| T1586.003 | Cloud Accounts |
| T1587 | Develop Capabilities |
| T1587.001 | Malware |
| T1587.002 | Code Signing Certificates |
| T1587.003 | Digital Certificates |
| T1587.004 | Exploits |
| T1588 | Obtain Capabilities |
| T1588.001 | Malware |
| T1588.002 | Tool |
| T1588.003 | Code Signing Certificates |
| T1588.004 | Digital Certificates |
| T1588.005 | Exploits |
| T1588.006 | Vulnerabilities |
| T1588.007 | Artificial Intelligence |
| T1589 | Gather Victim Identity Information |
| T1589.001 | Credentials |
| T1589.002 | Email Addresses |
| T1589.003 | Employee Names |
| T1590 | Gather Victim Network Information |
| T1590.001 | Domain Properties |
| T1590.002 | DNS |
| T1590.003 | Network Trust Dependencies |
| T1590.004 | Network Topology |
| T1590.005 | IP Addresses |
| T1590.006 | Network Security Appliances |
| T1591 | Gather Victim Org Information |
| T1591.001 | Determine Physical Locations |
| T1591.002 | Business Relationships |
| T1591.003 | Identify Business Tempo |
| T1591.004 | Identify Roles |
| T1592 | Gather Victim Host Information |
| T1592.001 | Hardware |
| T1592.002 | Software |
| T1592.003 | Firmware |
| T1592.004 | Client Configurations |
| T1593 | Search Open Websites/Domains |
| T1593.001 | Social Media |
| T1593.002 | Search Engines |
| T1593.003 | Code Repositories |
| T1594 | Search Victim-Owned Websites |
| T1595 | Active Scanning |
| T1595.001 | Scanning IP Blocks |
| T1595.002 | Vulnerability Scanning |
| T1595.003 | Wordlist Scanning |
| T1596 | Search Open Technical Databases |
| T1596.001 | DNS/Passive DNS |
| T1596.002 | WHOIS |
| T1596.003 | Digital Certificates |
| T1596.004 | CDNs |
| T1596.005 | Scan Databases |
| T1597 | Search Closed Sources |
| T1597.001 | Threat Intel Vendors |
| T1597.002 | Purchase Technical Data |
| T1598 | Phishing for Information |
| T1598.001 | Spearphishing Service |
| T1598.002 | Spearphishing Attachment |
| T1598.003 | Spearphishing Link |
| T1598.004 | Spearphishing Voice |
| T1599 | Network Boundary Bridging |
| T1599.001 | Network Address Translation Traversal |
| T1600 | Weaken Encryption |
| T1600.001 | Reduce Key Space |
| T1600.002 | Disable Crypto Hardware |
| T1601 | Modify System Image |
| T1601.001 | Patch System Image |
| T1601.002 | Downgrade System Image |
| T1602 | Data from Configuration Repository |
| T1602.001 | SNMP (MIB Dump) |
| T1602.002 | Network Device Configuration Dump |
| T1606 | Forge Web Credentials |
| T1606.001 | Web Cookies |
| T1606.002 | SAML Tokens |
| T1608 | Stage Capabilities |
| T1608.001 | Upload Malware |
| T1608.002 | Upload Tool |
| T1608.003 | Install Digital Certificate |
| T1608.004 | Drive-by Target |
| T1608.005 | Link Target |
| T1608.006 | SEO Poisoning |
| T1609 | Container Administration Command |
| T1610 | Deploy Container |
| T1611 | Escape to Host |
| T1612 | Build Image on Host |
| T1613 | Container and Resource Discovery |
| T1614 | System Location Discovery |
| T1614.001 | System Language Discovery |
| T1615 | Group Policy Discovery |
| T1619 | Cloud Storage Object Discovery |
| T1620 | Reflective Code Loading |
| T1621 | Multi-Factor Authentication Request Generation |
| T1622 | Debugger Evasion |
| T1647 | Plist File Modification |
| T1648 | Serverless Execution |
| T1649 | Steal or Forge Authentication Certificates |
| T1650 | Acquire Access |
| T1651 | Cloud Administration Command |
| T1652 | Device Driver Discovery |
| T1653 | Power Settings |
| T1654 | Log Enumeration |
| T1656 | Impersonation |
| T1657 | Financial Theft |
| T1659 | Content Injection |
| T1665 | Hide Infrastructure |
| T1666 | Modify Cloud Resource Hierarchy |
| T1667 | Email Bombing |
| T1668 | Exclusive Control |
| T1669 | Wi-Fi Networks |
| T1671 | Cloud Application Integration |
| T1672 | Email Spoofing |
| T1673 | Virtual Machine Discovery |
| T1674 | Input Injection |
| T1675 | ESXi Administration Command |